Owner's manual

Planning the DSM/SCM System Environment and
User Security
DSM/SCM User’s Guide 529846-014
4 - 9
Task 3: Planning DSM/SCM Users and Security
For more information on software inputs and product groups, see Managing
Software Input Groups or Product Groups on page 7-11.
4. Enter the CNFGINFO process name (optional); then click OK. SETUP asks if you
will use RSC or Winsock.
5. Select Winsock:
a. Click the Winsock button; then click OK. SETUP asks for the full path name of
the WINSOCK.DLL file.
b. Enter the name or IP address of the host system you will enter in INITENV;
then click OK.
c. Enter the IP port number that you will enter in INITENV for the DSM/SCM
Winsock service.
d. Click OK.
6. Enter the host system name; then click OK. SETUP updates your DSMSCM.INI file
with the information you entered. A dialog box appears indicating that SETUP is
finished and asking if you want to start the Planner Interface. If you are performing
a full configuration of DSM/SCM, indicate No. You can launch the Planner Interface
later when you need it.
7. After SETUP finishes, a program group called DSM/SCM appears, containing:
The DSMSCM icon, which launches the Planner Interface
The CNFGINFO icon, which launches the Configuration Information tool
The DSM/SCM and CNFGINFO softdoc files in text format
To access these items, select Start>Program>DSM/SCM on your PC desktop.
Task 3: Planning DSM/SCM Users and Security
Setting security for different DSM/SCM users (planners, database administrators, and
operators) determines what tasks they have permission to perform:
Planners have permission to plan, build, and apply software configurations. For
more information, see
Planner Tasks on page 4-14.
Operators have permission to initiate tasks on an assigned target system, usually
as directed by a planner. For more information, see
Operator Tasks on page 4-16
Database administrators have permission to:
Maintain the DSM/SCM database
Manage security of the DSM/SCM installation files and files on target systems
Establish user access permissions for target systems
Often installs or updates the configuration of DSM/SCM on all systems